Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-36876

Опубликовано: 08 авг. 2023
Источник: msrc
CVSS3: 7.1
EPSS Низкий

Описание

Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability

FAQ

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account.

According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N) but has major impact on integrity (I:H) and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability cannot access existing files (C:N) but can write or overwrite file contents (I:H), which potentially may cause the system to become unavailable (A:H).

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 29%
0.00102
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.1
nvd
больше 2 лет назад

Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability

CVSS3: 7.1
github
больше 2 лет назад

Reliability Analysis Metrics Calculation (RacTask) Elevation of Privilege Vulnerability

EPSS

Процентиль: 29%
0.00102
Низкий

7.1 High

CVSS3